Thank you for purchasing CompuDav Hacker X-8.9!

This reference has been included to provide a jump start to your new hacking career at Hacker X-8.9.

Introduction Screenshot

Introduction Legend

  1. User Name Field - This is where you input the user name of a pre-made account at Hacker X-8.9. If you do not have an account yet, please click "Create New Account", or see number four.

  2. Password Field - This is where you input the password of a pre-made account at Hacker X-8.9. If you do not have an account yet, please click "Create New Account", or see number four.

  3. Login Button - Clicking this initiates the login process to the Hacker X-8.9 main server and it also starts the HX89 Control Panel. Logging in is done through tiny CPU impulses which, in turn, create high-distance frequencies that are picked up by the Hacker X-8.9 servers half-way around the world.

  4. Create New Account - Clicking this tab brings up the screen below. Use this option if you're looking to create a new Hacker X-8.9 account. See below for more information.

Create New Account Screenshot

Create New Account Information

  1. First Name Field - Your first name is required for registration. Please provide it here.

  2. User Name Field - Select a user name for yourself and type it in here.

  3. Password Field - Select a reasonably secure password for yourself and enter it here.

  4. Confirm Password Field - The text entered in this field must be identical to the password entered in the above field. Unequal passwords will trigger an error.

  5. Sign Me Up! - Provided that everything checks out, this will sign you up for a new account at Hacker X-8.9.

Main Screen Screenshot

Main Screen Information

  1. Hack Computer Button - Click this when you are ready to begin your next hacking job. This will start the hacking process as described in the screens below.

  2. Upgrade Computer - Click this when you need to upgrade your old hardware into something a little more fancy (such as a triple G6 processor).

  3. Take a Loan - If you're short of cash, click this button to try to be approved for a loan. If you are approved, you'll have to pay back that loan over roughly 10 missions. Disapproval will mean that you'll have to try to make do with what you've got.

  4. Purchase Software - If you need better cracking tools, better DOS tools, or the infamous virus creation software, this is where you'll go to stock up on them. When in the software store, just click on the software's button on the left, and click "add to cart" in order to add it to a list of software to purchase. Clicking "remove from cart" will remove it from your list of software for purchase. When you're done, just click the "buy now" button and your software will arrive instantaneously.

  5. Write a Virus - Click this button to initiate the virus creation process. Please be advised that you must purchase the virus software beforehand, before you can use this option.

  6. E-Mail Viewer - Being a hacker requires constant communication. This table will allow you to receive your most recent mission.

  7. Personal Data - This area displays your personal statistics with Hacker X-8.9.

  8. Computer Data - Similar in function to the above area, this section displays the statistics of your computer that you are using in the hacking world. Upgrades can be made through the "upgrade computer" option, described in number two.

Initial Hacking Interface Screenshot (size has been reduced - click on picture for a full image)

Initial Hacking Interface Information

  1. General Information - This area includes the total time taken to hack the computer, the operating system that the computer is using (very important when considering deploying viruses), and it is also the area in which you'll be notified when your mission is complete.

  2. Percentage of Connection Traced - When this bar reaches 100%, you have been traced and you will be stripped of half of your money. Always keep an eye on this meter - when it starts reaching full capacity, you'd better hurry up, or get out of there!

  3. Percentage of Hacking/DOS Attack Completed - Although not depicted in the image, this is where you will be able to see exactly what percentage of your current hack/DOS attack is completed. Note that selecting a new cracking/DOS tool will reset this to zero.

  4. Selectable Cracking/DOS Tools - If you've purchased any tools besides the brute force cracker, they will be available here. Each cracking/DOS tool has some special options, as described below:

  • Brute Force Cracker - Two options: Check for characters - input characters in this box to give the application a hint as to what characters might be in the password. A correct character will lessen the hacking time, but an incorrect one will increase it. Hacking method change - changing the method will result in different hacking/trace time ratios, try this if you're starting to feel the hacking pressure.

  • Dictionary Cracker - One option: Optimize for smaller/larger words - has a fifty-fifty chance of increasing or decreasing the amount of time needed to crack the password.

  • Stealth Cracker - No options available.

  • UltiCrack 4.95 - Two options: Stealth Settings - This option will addjust the cracking/tracing time ratios. Sometimes they adjust in your favor, other times they don't. Predictive Password Completion - If this option is enabled, UltiCrack will use some predetermined algorithms to attempt to find the password. Like the above option, sometimes the algorithms are correct, and sometimes they aren't.

  • Simple-attack - No adjustable parameters available.

  • Final TKO - One option: Activate "DifficultTrace" technology - enabling this advanced technology can either increase or decrease the amount of time needed for the remote connection to trace you. Although this technology is very advanced, some servers have a way of beating the system, hence the possibility for a decrease in time needed to trace you.

  1. Other Tools - These are additional tools that you might need once you are inside the server. Clicking "Destroy Computer" will destroy the remote machine, but be warned that this is a permanent action, so make sure that you do not have any other tasks (such as copying a file) to complete. Selecting "add file" will permit you to add a file to the server.

  2. Server Information - This area displays the IP address of the server as well as its message of the day.

  3. Password Box/Login Button - The password box is used to display either the password cracking process or the cracked password itself, and is not user editable. When the password has been cracked, the login button will become enabled. Clicking this button will bring up the screen depicted below.

  4. Instructions - A "shortened" version of the necessary actions in order to complete the missions is displayed here. To get the full lowdown on what needs to happen, click on the "show actual e-mail" button.

  5. Copied Files View - This table lists all files that have been copied to your computer. You can later open these files by going to "Actions -> File Browser".

  6. Questions - If the mission requires that you answer questions, clicking this tab will display the questions and their respective text boxes in which you can input the answer. As soon as your answers match the correct ones, the "incorrect" will change to "correct".

File Viewer Screenshot

File Viewer Information

  1. Action Bar - This displays all the actions available for each file. In order to execute one of these actions, just select a file and click the respective button. If this action is not needed, you may get a message asking you whether or not you truly want to continue.

  2. Logout - When the mission is complete, this button will appear. Clicking it logs you out of the server and commences the next mission.

  3. File Table - This table lists all the files that are located on the server. Clicking on a file will select it and pressing delete/backspace while a file is selected will delete it.

  4. File Contents - This displays the contents of the selected file.